Abstract
Telemedicine has gained popularity in recent years. Medical images can be transferred over the Internet to enable the telediagnosis between medical staffs and to make the patient’s history accessible to medical staff from anywhere. Therefore, integrity protection of the medical image is a serious concern due to the broadcast nature of the Internet. Some watermarking techniques are proposed to control the integrity of medical images. However, they require embedding of extra information (watermark) into image before transmission. It decreases visual quality of the medical image and can cause false diagnosis. The proposed method uses passive image authentication mechanism to detect the tampered regions on medical images. Structural texture information is obtained from the medical image by using local binary pattern rotation invariant (LBPROT) to make the keypoint extraction techniques more successful. Keypoints on the texture image are obtained with scale invariant feature transform (SIFT). Tampered regions are detected by the method by matching the keypoints. The method improves the keypoint-based passive image authentication mechanism (they do not detect tampering when the smooth region is used for covering an object) by using LBPROT before keypoint extraction because smooth regions also have texture information. Experimental results show that the method detects tampered regions on the medical images even if the forged image has undergone some attacks (Gaussian blurring/additive white Gaussian noise) or the forged regions are scaled/rotated before pasting.
Similar content being viewed by others
References
Das S, Kundu MK: Effective management of medical information through ROI-lossless fragile image watermarking technique. Computer Methods and Programs in Biomedicine 111(3):662–75, 2013
Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–43, 2013
Arsalan M, Malik SA, Khan A: Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 85(4):883–94, 2012
Fridrich AJ, Soukal BD, and Lukáš AJ: Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop 3(2):652–63, 2003
Zain JM, Fauzi AM: Medical image watermarking with tamper detection and recovery. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE 1:3270–3, 2006
Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008
Chiang K-H, Chang-Chien K-C, Chang R-F, Yen H-Y: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging. p. 77–90, 2008
Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24(1):114–25, 2011
Al-Qershi OM, Khoo BE: ROI-based tamper detection and recovery for medical images using reversible watermarking technique. 2010 I.E. Int Conf Inf Theory Inf Secur 151–5, 2010
Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. Proc - 2010 3rd IEEE Int Conf Comput Sci Inf Technol ICCSIT 2010. p. 417–20, 2010
Memon NA, Chaudhry A, Ahmad M, Keerio ZA. Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics. 2011; 88(10):2057–71.
Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging. 24(3):528–40, 2011
Tjokorda Agung BW, Adiwijaya Permana FP: Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. Proceeding - COMNETSAT 2012 2012 I.E. Int Conf Commun Networks Satell. p. 167–71, 2012
Deng X, Chen Z, Zeng F, Zhang Y, Mao Y. Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of nanoscience and nanotechnology. 13(3), 2099–107, 2013.
Eswaraiah R, Sreenivasa Reddy E: Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl. Hindawi Publishing Corporation; 2014; 2014:1–10. Available from: http://www.hindawi.com/journals/ijta/2014/984646/
Ojala T, Pietikäinen M, Mäenpää T: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell. 24(7):971–87, 2002
Lowe G: SIFT, the scale invariant feature transform. Int J. Of Computer Vision, 60(2), 91–110, 2004
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur. 6(3 PART 2):1099–110, 2011
Bay H, Tuytelaars T, Van Gool L SURF: speeded up robust features. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). p. 404–17, 2006
Barre S 1999 Available at: http://www.barre.nom.fr/medical/samples/.
Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir’s secret sharing scheme, Journal of Systems and Software, 84, 3, 341–353, doi:10.1016/j.jss.2010.11.928, ISSN 0164-1212, 2011
Thabit R, Khoo BE: Medical image authentication using SLT and IWT schemes. Multimed Tools App 1–24,2015. Available from: doi:10.1007/s11042–015-3055-x
Eswaraiah R and Sreenivasa Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Processing, 9, 8, pp. 615–625, 2015
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interests
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Ulutas, G., Ustubioglu, A., Ustubioglu, B. et al. Medical Image Tamper Detection Based on Passive Image Authentication. J Digit Imaging 30, 695–709 (2017). https://doi.org/10.1007/s10278-017-9961-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10278-017-9961-x